General

  • Target

    860-124-0x00000000042C0000-0x00000000042F4000-memory.dmp

  • Size

    208KB

  • MD5

    9d9cbb4f8b89ea945c1cbdc9015fc261

  • SHA1

    e39e6dbc891dcf817be955be973ca1aa830b4e07

  • SHA256

    33cd2b93d12f6ee4c44294b95235492359791fe743364d44bd69d71291e0e514

  • SHA512

    18f40189c5e6a7364a5f2b42ff4255ef84e0be93f35e8beca55f480598f4f73afedb425b7589438fa704543e7e805bce228f9f801e91a78ab74749ef047dd373

  • SSDEEP

    3072:mqns695m5jVHLoE0B2BXkrmK7lw7Lo4+PnzL/8e8hQh:7ns6CjVHLK/laLozP

Malware Config

Extracted

Family

redline

Botnet

LogsDiller Cloud (Telegram: @logsdillabot)

C2

51.89.201.49:6932

Attributes
  • auth_value

    c2955ed3813a798683a185a82e949f88

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 860-124-0x00000000042C0000-0x00000000042F4000-memory.dmp
    .exe windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections